KR20180082697A - Operation method of the home area network capable reinforcing the security for managing power demand efficiently - Google Patents
Operation method of the home area network capable reinforcing the security for managing power demand efficiently Download PDFInfo
- Publication number
- KR20180082697A KR20180082697A KR1020170003505A KR20170003505A KR20180082697A KR 20180082697 A KR20180082697 A KR 20180082697A KR 1020170003505 A KR1020170003505 A KR 1020170003505A KR 20170003505 A KR20170003505 A KR 20170003505A KR 20180082697 A KR20180082697 A KR 20180082697A
- Authority
- KR
- South Korea
- Prior art keywords
- security
- area network
- home area
- customer
- operation method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims description 6
- 230000003014 reinforcing effect Effects 0.000 title 1
- 238000011017 operating method Methods 0.000 claims abstract description 4
- 238000007726 management method Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 230000005611 electricity Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 208000018208 Hyperimmunoglobulinemia D with periodic fever Diseases 0.000 description 1
- 206010072219 Mevalonic aciduria Diseases 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000003912 environmental pollution Methods 0.000 description 1
- 239000002803 fossil fuel Substances 0.000 description 1
- 229920005669 high impact polystyrene Polymers 0.000 description 1
- 239000004797 high-impact polystyrene Substances 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- DTXLBRAVKYTGFE-UHFFFAOYSA-J tetrasodium;2-(1,2-dicarboxylatoethylamino)-3-hydroxybutanedioate Chemical compound [Na+].[Na+].[Na+].[Na+].[O-]C(=O)C(O)C(C([O-])=O)NC(C([O-])=O)CC([O-])=O DTXLBRAVKYTGFE-UHFFFAOYSA-J 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5051—Service on demand, e.g. definition and deployment of services in real time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
Abstract
본 발명은 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법에 관한 것이다. The present invention relates to a home area network operating method with enhanced security for efficient demand management.
Description
본 발명은 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법에 관한 것이다.The present invention relates to a home area network operating method with enhanced security for efficient demand management.
현재 능동적 전력 관리를 목표로 하는 국가들은 대부분 DSM (Demand Side Management)를 운영하고 있다. Currently, most of the countries that are aiming at active power management are running Demand Side Management (DSM).
그러나 이는 수용가(전기를 사용하는 한국정력의 고객)의 전력 제어를 위한 네트워크가 어떤 방식으로 구성되어있는가에 따라 DSM 이 가능여부가 결정된다.However, this is based on the way in which the network for power control of the consumer (the customer of the Korean vigor using the electricity) is configured to determine whether DSM is possible.
즉, 수용가에서의 네트워크 기반이 매우 중요한 역할을 한다. 그러나, DSM 을 위하여 수용가에서 자체 비용으로 네트워크를 구축할 수도 없거니와, 현재 DSM 을 위한 네트워크 체제가 표면화 되어 있는 것도 아니다.In other words, the network infrastructure in the customer plays a very important role. However, for the DSM, it is impossible for the customer to build a network at its own expense, and the network system for the DSM is not surfaced at present.
이를 위해, 가전 기기 등 전기를 사용하는 장치 또는 장비의 전원 인입부에 설치되어 전기의 사용량을 감지하고, 감지 결과에 따른 서비스적인 후속 조치를 가능하게 하는 제반 구성이 필요하다.For this purpose, there is a need for a configuration that is installed in a power input portion of a device or an apparatus that uses electricity such as a household appliance to detect the amount of electricity used and enable service follow-up according to the detection result.
따라서, 원격 검침 기능을 이용하여 수용가의 수전점에 설치된 전력량계에서 유무선 통신으로 수용가의 전력량을 측정할 수 있도록 수용가 내의 전기 사용 기기 간의 네트워크 구성이 필요하다.Therefore, it is necessary to construct a network between the electric devices in the customer so that the electric power of the customer can be measured by wired / wireless communication in the watt hour meter provided at the water receiving point of the customer by using the remote meter reading function.
본 발명이 해결하고자 하는 과제는, 해킹으로 인한 침입을 조기 차단하여 보안성을 강화하는 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법을 제공하는 것이다.SUMMARY OF THE INVENTION It is an object of the present invention to provide a home area network operating method with enhanced security for efficiently managing demand by enhancing security by preventing an intrusion by hacking.
본 발명은 수요 관리를 이용하여 외부로부터 수용가의 기기 제어를 허용하여 제한되고 인가죈 정보에 국한하여 진입을 허락함으로써 홈 영역 네트워크에서의 보안성을 강화할 수 있다.The present invention can enhance the security in the home area network by allowing the control of the device of the customer from the outside by using the demand management and allowing the entry to be limited to the authorized information.
도 1은 홈 영역 네트워크의 구성을 나타내는 도면이다.
도 2는 고객의 휴대폰의 컴퓨팅 파워를 이용하여 암호를 해독하고 이에 따른 인증서 발급 등의 기능을 통하여 DM 요구 신호의 보안성을 강화하는 과정을 설명하는 도면이다.1 is a diagram showing a configuration of a home area network.
FIG. 2 is a diagram illustrating a process of enhancing the security of a DM request signal by decrypting a password using the computing power of a customer's mobile phone and issuing a certificate according to the decryption.
이하에서는, 본 발명의 바람직한 실시예에 기초하여 본 발명을 보다 구체적으로 설명한다. 그러나, 하기 실시예는 본 발명의 이해를 돕기 위한 일 예에 불과한 것으로 이에 의해 본 발명의 권리범위가 축소되거나 한정되는 것은 아니다.Hereinafter, the present invention will be described more specifically based on preferred embodiments of the present invention. However, the following embodiments are merely examples for helping understanding of the present invention, and thus the scope of the present invention is not limited or limited.
DSM (Demand Side Management; 수요관리)의 궁극적 목적은 전력수요를 합리적으로 조절하여 부하율 향상을 통한 원가절감과 전력 수급안정을 도모함과 동시에 국가적인 에너지자원 절약에도 기여하는데 있다. 또한 최근에는 화석연료 사용에 따른 환경오염문제가 심각히 대두됨에 따라 환경친화적인 에너지정책 대안으로 강조되고 있다 The ultimate goal of DSM (Demand Side Management) is to contribute to national energy saving while reducing cost, rationalizing supply and demand, and rationalizing power demand. Recently, environmental pollution caused by the use of fossil fuels has become serious, and it is emphasized as an environment friendly energy policy alternative
부하율이란 일정기간에 있어서 최대전력에 대한 평균전력의 비율을 말하며 최대전력을 감소하거나 평균전력을 증대시킴으로써 부하율을 향상할 수 있다.The load factor is the ratio of the average power to the maximum power in a certain period, and the load factor can be improved by decreasing the maximum power or increasing the average power.
DSM 의 단편적 기능 표현으로는 전력공급회사에서 수용가의 특정 전기 또는 전자 제품을 사전 허용한도 내에서 제어를 함으로써 전력 수요를 조절 관리 하는 방식을 뜻한다. 현재 미국에서는 피크 전력 시간에 수용가의 에어컨 온도를 2도 상향하는 등의 제어를 전력 공급회사가 함으로써 DSM을 통한 부하율을 조율 하고 있다.DSM's piecemeal function expression refers to a way in which a power supply company manages and controls the demand for electricity by controlling certain electrical or electronic products of the consumer within a preliminary limit. In the US, the power supply company controls the load factor through DSM by controlling the temperature of the customer's air conditioner by two degrees in peak power time.
원래 수요관리(DSM)라는 용어는 1970년대 미국에서 시작하여 점차 각 국으로 확산되었으며 그간 이론적 경제성과 높은 잠재적 기여도에도 불구하고 종전 전력회사 공급측 위주의 전력수급계획 추진에 따라 별 관심을 받지 못하다가 전원입지의 확보난 가중, 건설에 따른 막대한 투자 재원의 조달문제, 환경규제의 강화 등으로 공급설비의 적기확보가 어려워지고 최근 최소비용계획(least cost planning)의 일환으로 공급측 대안과 수요측 대안의 최적조합을 찾는 통합자원계획 (Integrated Resource Planning) 개념의 확산으로 수요관리 방안을 전력수급계획에서 필수적인 고려사항으로 간주하게 되어 수요관리의 중요성이 더욱 강조 되었다.The term DSM originally originated in the United States in the 1970s and gradually spread to other countries. Despite the theoretical economic and high potential contribution, As a result of the difficulty in securing timely provision of supply facilities due to the increase in the number of sites secured, the procurement of huge investment resources due to construction, and the strengthening of environmental regulations, the optimal combination of supply side and demand side alternatives , The importance of demand management has been emphasized because the idea of managing demand has been regarded as an essential consideration in the power supply plan by the spread of integrated resource planning concept.
전력공급회사에서 수 많은 수용가와 통신 인프라를 구축하기 힘드므로 본 발명에서는 수용가에 있는 무선공유기(또는 인터넷공유기)를 기반으로 인터넷 통신을 하는 것을 전제로 한다. 수용가의 다수 기기는 홈 영역 네트워크(Home Area Network: 이하, HAN)으로 구성 되어 있으며 HAN은 다양한 방법을 통하여 구성 될 수 있다. 이러한 환경에서 TCP/IP 등의 신뢰성 기반의 통신을 하는 과정에서 해킹 등에 취약 해 질 수 있다. (도 1 참조)Since it is difficult for a power supply company to build a large number of customers and a communication infrastructure, the present invention presupposes that an Internet communication is performed based on a wireless router (or an Internet router) in a customer. A plurality of devices of a customer are composed of a home area network (HAN), and the HAN can be configured through various methods. In this environment, it can be vulnerable to hacking and the like in the course of performing reliability based communication such as TCP / IP. (See Fig. 1)
도 1과 같은 HAN 기반의 환경 구축은 가능하나 본 발명에서는 동일 환경 내에서 보안성의 강화를 목적으로 한다. 보안성은 대표적 해킹인 DDOS 등의 침입을 조기 차단하는 것을 목적으로 한다Although it is possible to construct an environment based on HAN as shown in FIG. 1, the present invention aims to enhance security in the same environment. The purpose of security is to prevent intrusions such as DDOS which is a typical hack
이러한 목적으로는 NIDS, HIDS, NIPS, HIPS 등의 장비 또는 방식이 있으나 본 발명에서는 기기 내 네트워크(HAN 등) 에서의 보안에 관한 것이다.For this purpose, there are devices or systems such as NIDS, HIDS, NIPS, and HIPS, but the present invention relates to security in an intra-device network (HAN, etc.).
즉 DSM 은 외부로부터 수용가의 기기 제어를 허용하는 것이므로 제한되고 인가된 정보에 국한되어 진입을 허락하여야 한다.In other words, the DSM permits the control of the equipment of the customer from the outside, so it should be limited to limited and authorized information.
한편, 도 2는 고객의 휴대폰의 컴퓨팅 파워를 이용하여 암호를 해독하고 이에 따른 인증서 발급 등의 기능을 통하여 DM 요구 신호의 보안성을 강화한다.Meanwhile, FIG. 2 enhances the security of the DM request signal by decrypting the password using the computing power of the customer's mobile phone and issuing a certificate according to the decryption.
이상에서 본 발명에 대한 기술 사상을 첨부 도면과 함께 서술하였지만, 이는 본 발명의 바람직한 실시예를 예시적으로 설명한 것이지 본 발명을 한정하는 것은 아니다. 또한, 이 기술 분야의 통상의 지식을 가진 자라면 누구나 본 발명의 기술 사상의 범주를 이탈하지 않는 범위 내에서 다양한 변형 및 모방이 가능함은 명백한 사실이다.Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims. In addition, it is a matter of course that various modifications and variations are possible without departing from the scope of the technical idea of the present invention by anyone having ordinary skill in the art.
Claims (3)
상기 인증서 발급을 이용하여 수요관리 요구신호의 보안성을 강화하는, 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법.The method according to claim 1,
And the security of the demand management request signal is enhanced by using the certificate issuance.
동일 환경 내에서 분산서비스거부공격 침입을 차단하도록 보안성을 강화하는, 효율적인 수요관리를 위한 보안성이 강화된 홈 영역 네트워크 운영방법.
3. The method of claim 2,
A security-enhanced home area network operating method for efficient demand management that enhances security to prevent distributed denial of service attacks in the same environment.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020170003505A KR20180082697A (en) | 2017-01-10 | 2017-01-10 | Operation method of the home area network capable reinforcing the security for managing power demand efficiently |
| PCT/KR2018/000387 WO2018131862A1 (en) | 2017-01-10 | 2018-01-09 | Security-enhanced home area network operating method for efficient demand management |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020170003505A KR20180082697A (en) | 2017-01-10 | 2017-01-10 | Operation method of the home area network capable reinforcing the security for managing power demand efficiently |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| KR20180082697A true KR20180082697A (en) | 2018-07-19 |
Family
ID=62839385
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020170003505A Withdrawn KR20180082697A (en) | 2017-01-10 | 2017-01-10 | Operation method of the home area network capable reinforcing the security for managing power demand efficiently |
Country Status (2)
| Country | Link |
|---|---|
| KR (1) | KR20180082697A (en) |
| WO (1) | WO2018131862A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110874911B (en) * | 2019-11-12 | 2022-04-22 | 上海盛付通电子支付服务有限公司 | Information transmission method, electronic device, and computer-readable storage medium |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20030020388A (en) | 2001-05-17 | 2003-03-08 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Wireless master-slave distributed communications network |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100889670B1 (en) * | 2007-08-08 | 2009-03-19 | 삼성에스디에스 주식회사 | How to block TCP-based denial of service attacks on mobile devices |
| JP2011154410A (en) * | 2010-01-25 | 2011-08-11 | Sony Corp | Analysis server and method of analyzing data |
| KR101214427B1 (en) * | 2010-12-27 | 2013-01-09 | 한국전기연구원 | Supervisory Control and Data Acquisition System and Security management method thereof |
| KR101213287B1 (en) * | 2011-02-23 | 2012-12-20 | 한국전자통신연구원 | Building energy integration management apparatus and building energy integration management method |
| US20180278091A1 (en) * | 2014-11-07 | 2018-09-27 | Kazunori Fukasawa | Communication system, communication apparatus, method of controlling the communication apparatus, and program |
-
2017
- 2017-01-10 KR KR1020170003505A patent/KR20180082697A/en not_active Withdrawn
-
2018
- 2018-01-09 WO PCT/KR2018/000387 patent/WO2018131862A1/en not_active Ceased
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20030020388A (en) | 2001-05-17 | 2003-03-08 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Wireless master-slave distributed communications network |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2018131862A1 (en) | 2018-07-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zografopoulos et al. | Distributed energy resources cybersecurity outlook: Vulnerabilities, attacks, impacts, and mitigations | |
| Mousavian et al. | A risk-based optimization model for electric vehicle infrastructure response to cyber attacks | |
| Jokar et al. | A survey on security issues in smart grids | |
| US8639922B2 (en) | System, method, and apparata for secure communications using an electrical grid network | |
| Choi et al. | Multi-agent based cyber attack detection and mitigation for distribution automation system | |
| US20180227627A1 (en) | System and method for secure appliance operation | |
| CA3039624C (en) | System and method for secure appliance operation | |
| Mohammed et al. | Vulnerabilities and strategies of cybersecurity in smart grid-evaluation and review | |
| Wagner et al. | Smart grid cyber security: A German perspective | |
| Zhao et al. | An overview of cyber security for smart grid | |
| Vigo et al. | Smart grid security a smart meter-centric perspective | |
| Kumar et al. | Secure communication for advance metering infrastructure in smart grid | |
| KR20180082697A (en) | Operation method of the home area network capable reinforcing the security for managing power demand efficiently | |
| Lighari et al. | Attacks and their defenses for advanced metering infrastructure | |
| Maruvala et al. | Cyberattack issues on smart metering infrastructure | |
| Chang et al. | Design of an authentication and key management system for a smart meter gateway in AMI | |
| Nie et al. | M2M security threat and security mechanism research | |
| Wang | Smart grid, automation, and scada systems security | |
| Kuroptev et al. | Coordinated cyber attacks on smart grids considering software supply chains | |
| Bhadani | Smart Grid Security: Innovative Approaches for Threat Detection and Countermeasures | |
| Wu et al. | Cyber Security and information protection in a smart grid environment | |
| Yaghmaee et al. | Monitoring approach for detection compromise attacks in smart meter | |
| He et al. | Design of Multi-Layer Information Security Protection Scheme for Vehicle-to-Grid System | |
| Seo et al. | The green defenders | |
| KR101243943B1 (en) | System and method for power management in the smart grid |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0109 | Patent application |
Patent event code: PA01091R01D Comment text: Patent Application Patent event date: 20170110 |
|
| PG1501 | Laying open of application | ||
| PC1203 | Withdrawal of no request for examination |